At EUROCRYPT 2009, Gauravaram and Knudsen presented an online birthday attack on the randomized hashing scheme standardized in NIST SP800-106. This attack uses a fact that it is easy to find fixed points for the Davies-Meyer-type compression functions of standardized hash functions such as those in the SHA-2 family. This attack is significant in that it is an attack on the target collision resistance (TCR) of the randomized hashing scheme which is claimed to be enhanced TCR (eTCR). TCR is a property weaker than eTCR. In this paper, we will present a randomized hashing scheme called RMC. We will also prove that RMC satisfies both TCR and eTCR in the random oracle model and in the ideal cipher model. In particular, the proof for the TCR security in the ideal cipher model implies that the attack by Gauravaram and Knudsen is not effective against RMC.
CITATION STYLE
Gauravaram, P., Hirose, S., & Stebila, D. (2017). Security analysis of a design variant of randomized hashing. In Communications in Computer and Information Science (Vol. 719, pp. 14–22). Springer Verlag. https://doi.org/10.1007/978-981-10-5421-1_2
Mendeley helps you to discover research relevant for your work.